Vendors & Solution Providers

Vendors produce authenticators, tokens, validation servers, and identity platforms that implement OATH standards. Typical activities include:

  • Implementing HOTP, TOTP, OCRA, PSKC, DSKPP, and related standards.
  • Declaring and documenting OATH profiles supported by their products.
  • Participating in interoperability testing and certification programs.

Service Providers & Enterprises

Deployers integrate OATH-compliant components into their infrastructure. Activities include:

  • Designing authentication architectures using OATH standards.
  • Procuring OATH-compliant authenticators and server components.
  • Performing interoperability tests across multiple vendors.

Interoperability & Community

One of OATH’s key goals is to foster an ecosystem where organizations can combine components from multiple vendors with predictable behavior. This requires:

  • Clear, stable standards and profiles.
  • Transparent documentation of implementations.
  • Feedback from real-world deployments to refine guidance and profiles.

OATH encourages implementers to share their experience with the broader community to improve interoperability and usability.

Representative Implementers

A variety of product categories commonly implement OATH standards, including:

  • Hardware OTP tokens and smart cards.
  • Software authenticators for mobile and desktop platforms.
  • Authentication servers and identity providers.
  • Cloud services that offer multi-factor authentication capabilities.

For specific implementers or partners, please refer to official OATH communications or your existing membership/partner documentation.